EC2 instance using default security group
This product is not supported for your selected
Datadog site. (
).
Id: f1adc521-f79a-4d71-b55b-a68294687432
Cloud Provider: aws
Framework: Terraform
Severity: Medium
Category: Access Control
Learn More
Description
Amazon EC2 instances should not use the default security group, as this group is open by default and permits unrestricted inbound and outbound traffic (security_groups = [aws_security_group.default.id]
). Using the default security group increases the risk of unauthorized access, lateral movement, and exposure of sensitive workloads. To reduce this attack surface, instances should be assigned to tightly controlled, custom security groups with explicit ingress and egress rules.
Compliant Code Examples
resource "aws_instance" "negative2" {
ami = "ami-003634241a8fcdec0"
instance_type = "t2.micro"
vpc_security_group_ids = [aws_security_group.sg.id]
}
resource "aws_instance" "negative1" {
ami = data.aws_ami.ubuntu.id
instance_type = "t3.micro"
tags = {
Name = "HelloWorld"
}
security_groups = [aws_security_group.sg.id]
}
Non-Compliant Code Examples
resource "aws_instance" "positive2" {
ami = "ami-003634241a8fcdec0"
instance_type = "t2.micro"
vpc_security_group_ids = [aws_security_group.default.id]
}
resource "aws_instance" "positive1" {
ami = data.aws_ami.ubuntu.id
instance_type = "t3.micro"
tags = {
Name = "HelloWorld"
}
security_groups = [aws_security_group.default.id]
}